TalksAWS re:Invent 2025 - Building Zero-CVE Container Images at Scale: Patterns and Pitfalls (MAM215)

AWS re:Invent 2025 - Building Zero-CVE Container Images at Scale: Patterns and Pitfalls (MAM215)

Building Zero-CVE Container Images at Scale: Patterns and Pitfalls

Overview of Chain Guard

  • Chain Guard's mission is to be the secure source for open-source software (OSS)
  • They provide over 1,818 container images with 134,000+ versions, all built to be secure and compliant
  • Key tools used include:
    • Malange - Package manager for building APKO packages
    • Octo STS - GitHub security tool for managing security tokens
    • SigStore - For signing container images
    • Malcontent - Scans container images for malware

Building from Source for Trust and Security

  • Building from source code provides deeper visibility and "depth in defense" compared to using pre-built images
  • Allows using safer compiler options to reduce vulnerabilities in the software stack
  • Enables trusting the provenance and integrity of the built artifacts

The Chain Guard Factory

  • Automated pipeline that downloads OSS projects, generates package builds, remediates CVEs, and publishes secure container images
  • Runs 24/7, rebuilding all 1,818 projects daily to address zero-day vulnerabilities and keep packages up-to-date
  • Utilizes massive scale, spinning up over 1,000 CPU cores to handle the build workload

Automating the Build Process

  • Heavily leverages GitHub pull requests to manage version updates and CVE remediations
  • Automates package building, testing, and image publishing using Kubernetes and the Malange tool
  • Employs AI to diagnose and fix build errors, improving the testing and quality of the output

Rigorous Testing and Validation

  • Images are not released until they pass comprehensive functional testing on real Kubernetes clusters
  • Uses tools like Helm, Docker, and custom test harnesses to validate the images beyond just "hello world"
  • Ensures the built artifacts are truly production-ready and meet the required standards

Secure Distribution and Customization

  • All images are signed with SigStore and pushed to customers' private repositories
  • Customers can clone the images and further customize them with their own packages and configurations
  • Chain Guard also provides a set of 54 free, zero-CVE base and application images for common use cases

The Chain Guard Software Stack

  • Chain Guard OS - A minimal, hardened operating system distribution maintained by Chain Guard
  • Chain Guard Virtual Machines - Secure VM images built using the same principles as the container images
  • Chain Guard Containers - The core container image offering, with FIPS-compliant versions available
  • Chain Guard Helm Charts - Open-source Helm charts for popular applications, maintained by Chain Guard
  • Chain Guard Libraries - Secure, hardened versions of popular open-source libraries (Python, Java, JavaScript)

Key Takeaways

  • Chain Guard has built a highly scalable, automated factory to produce secure, zero-CVE container images from open-source projects
  • Their approach emphasizes building from source, using safer compiler options, and rigorous testing to ensure trust and security
  • The Chain Guard software stack provides a comprehensive set of secure, hardened options for containers, VMs, operating systems, Helm charts, and libraries
  • By offloading the burden of building and maintaining secure OSS artifacts, Chain Guard aims to help organizations focus on their core business while ensuring their software supply chain is secure

Your Digital Journey deserves a great story.

Build one with us.

Cookies Icon

These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.